Gentoo Archives: gentoo-announce

From: Robert Buchholz <rbu@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200903-15 ] git: Multiple vulnerabilties
Date: Mon, 09 Mar 2009 14:01:06
Message-Id: 200903091456.34237.rbu@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200903-15
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: git: Multiple vulnerabilties
9 Date: March 09, 2009
10 Bugs: #251343
11 ID: 200903-15
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities in gitweb allow for remote execution of
19 arbitrary commands.
20
21 Background
22 ==========
23
24 GIT - the stupid content tracker, the revision control system used by
25 the Linux kernel team.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 dev-util/git < 1.6.0.6 >= 1.6.0.6
34
35 Description
36 ===========
37
38 Multiple vulnerabilities have been reported in gitweb that is part of
39 the git package:
40
41 * Shell metacharacters related to git_search are not properly
42 sanitized (CVE-2008-5516).
43
44 * Shell metacharacters related to git_snapshot and git_object are not
45 properly sanitized (CVE-2008-5517).
46
47 * The diff.external configuration variable as set in a repository can
48 be executed by gitweb (CVE-2008-5916).
49
50 Impact
51 ======
52
53 A remote unauthenticated attacker can execute arbitrary commands via
54 shell metacharacters in a query, remote attackers with write access to
55 a git repository configuration can execute arbitrary commands with the
56 privileges of the user running gitweb by modifying the diff.external
57 configuration variable in the repository and sending a crafted query to
58 gitweb.
59
60 Workaround
61 ==========
62
63 There is no known workaround at this time.
64
65 Resolution
66 ==========
67
68 All git users should upgrade to the latest version:
69
70 # emerge --sync
71 # emerge --ask --oneshot --verbose ">=dev-util/git-1.6.0.6"
72
73 References
74 ==========
75
76 [ 1 ] CVE-2008-5516
77 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5516
78 [ 2 ] CVE-2008-5517
79 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5517
80 [ 3 ] CVE-2008-5916
81 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5916
82
83 Availability
84 ============
85
86 This GLSA and any updates to it are available for viewing at
87 the Gentoo Security Website:
88
89 http://security.gentoo.org/glsa/glsa-200903-15.xml
90
91 Concerns?
92 =========
93
94 Security is a primary focus of Gentoo Linux and ensuring the
95 confidentiality and security of our users machines is of utmost
96 importance to us. Any security concerns should be addressed to
97 security@g.o or alternatively, you may file a bug at
98 http://bugs.gentoo.org.
99
100 License
101 =======
102
103 Copyright 2009 Gentoo Foundation, Inc; referenced text
104 belongs to its owner(s).
105
106 The contents of this document are licensed under the
107 Creative Commons - Attribution / Share Alike license.
108
109 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature